In this paper, we show that the key scheduling algorithm of the recently proposed stream cipher Turing suffers from important flaws. These weaknesses allow an attacker that chooses the initialization vector (IV) to recover some partial information about the secret key. In particular, when using Turing with a 256-bit secret key and a 128-bit IV, we present an attack that requires the ability to choose 237 IV and then recovers the key with complexity 272, requiring 236 bytes of memory. © Springer-Verlag Berlin Heidelberg 2004.
Mendeley helps you to discover research relevant for your work.
CITATION STYLE
Joux, A., & Muller, F. (2004). A chosen IV attack against Turing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3006, 194–207. https://doi.org/10.1007/978-3-540-24654-1_14